Go to file
Johannes Weberhofer 346c68ba29 Accepting request 536273 from home:weberho:branches:security
- Updated to version 0.10.1. Changelog:
  https://github.com/fail2ban/fail2ban/blob/0.10/ChangeLog
- Removed 607568f.patch and 1783.patch
- New features: 
  * IPv6 support
    - IP addresses are now handled as objects rather than strings capable for 
      handling both address types IPv4 and IPv6
    - iptables related actions have been amended to support IPv6 specific actions
      additionally
    - hostsdeny and route actions have been tested to be aware of v4 and v6 already
    - pf action for *BSD systems has been improved and supports now also v4 and v6
    - name resolution is now working for either address type
    - new conditional section functionality used in config resp. includes:
      - [Init?family=inet4] - IPv4 qualified hosts only
      - [Init?family=inet6] - IPv6 qualified hosts only
  * Reporting via abuseipdb.com
    - Bans can now be reported to abuseipdb
    - Catagories must be set in the config
    - Relevant log lines included in report
  * Several commands extended and new commands introduced
  * Implemented execution of `actionstart` on demand
  * nftables actions are IPv6-capable now
  * Introduced new filter option `prefregex` for pre-filtering using single regular expression
  * Many times faster because of several optimizations
  * Several filters optimized
  * Introduced new jail option "ignoreself"
- Lots of fixes and internal improvements
- Incompatibitilities:
  * Filter (or `failregex`) internal capture-groups:
  - If you've your own `failregex` or custom filters using conditional match `(?P=host)`, you should
    rewrite the regex like in example below resp. using `(?:(?P=ip4)|(?P=ip6)` instead of `(?P=host)`
    (or `(?:(?P=ip4)|(?P=ip6)|(?P=dns))` corresponding your `usedns` and `raw` settings).
    Of course you can always your own capture-group (like below `_cond_ip_`) to do this.
    ```
    testln="1500000000 failure from 192.0.2.1: bad host 192.0.2.1"
    fail2ban-regex "$testln" "^\s*failure from (?P<_cond_ip_><HOST>): bad host (?P=_cond_ip_)$"
    ```
  - New internal groups (currently reserved for internal usage):
    `ip4`, `ip6`, `dns`, `fid`, `fport`, additionally `user` and another captures in lower case if
    mapping from tag `<F-*>` used in failregex (e. g. `user` by `<F-USER>`).
  * v.0.10 uses more precise date template handling, that can be theoretically incompatible to some
  user configurations resp. `datepattern`.
  * Since v0.10 fail2ban supports the matching of the IPv6 addresses, but not all ban actions are
  IPv6-capable now.

OBS-URL: https://build.opensuse.org/request/show/536273
OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=83
2017-10-24 10:04:00 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/fail2ban?expand=0&rev=1 2009-02-11 03:32:18 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/fail2ban?expand=0&rev=1 2009-02-11 03:32:18 +00:00
f2b-restart.conf Accepting request 230864 from home:jengelh:branches:security 2014-04-28 09:16:08 +00:00
fail2ban-0.10.1.tar.gz Accepting request 536273 from home:weberho:branches:security 2017-10-24 10:04:00 +00:00
fail2ban-disable-iptables-w-option.patch Accepting request 329445 from home:weberho:branches:security 2015-09-07 08:44:02 +00:00
fail2ban-opensuse-locations.patch Accepting request 452855 from home:computersalat:devel:security 2017-01-27 17:09:05 +00:00
fail2ban-opensuse-service.patch Accepting request 536273 from home:weberho:branches:security 2017-10-24 10:04:00 +00:00
fail2ban-rpmlintrc Accepting request 314731 from home:weberho:branches:security 2015-07-01 19:56:17 +00:00
fail2ban.changes Accepting request 536273 from home:weberho:branches:security 2017-10-24 10:04:00 +00:00
fail2ban.logrotate Accepting request 214757 from home:weberho:branches:security 2014-01-23 08:49:19 +00:00
fail2ban.spec Accepting request 536273 from home:weberho:branches:security 2017-10-24 10:04:00 +00:00
fail2ban.sysconfig Accepting request 57266 from home:leonardocf:branches:security 2011-01-07 13:28:41 +00:00
fail2ban.tmpfiles Accepting request 199913 from home:marc_schuetz:branches:security 2013-09-23 09:42:53 +00:00
paths-opensuse.conf Accepting request 369600 from home:weberho:branches:security 2016-03-10 12:14:45 +00:00
sfw-fail2ban.conf Accepting request 230864 from home:jengelh:branches:security 2014-04-28 09:16:08 +00:00